Information security management
Field of study: Creative management in new media
Programme code: W8-S2CM20.2020

Module name: | Information security management |
---|---|
Module code: | 09-ZN-S2-ZBI |
Programme code: | W8-S2CM20.2020 |
Semester: |
|
Language of instruction: | depending on the choice |
Form of verification: | exam |
ECTS credits: | 2 |
Description: | The rapid development of computerization entails threats related to information security. These threats can be characterized by means of three basic components of information security, such as loss of confidentiality, restriction of accessibility and breach of information integrity. They can be accidental in nature (failures, software errors and human mistakes), can be caused by natural factors such as fire, flood or lightning, and can also be the result of deliberate actions by people.
The aim of this course is to make people aware of potential threats in the network, and what the consequences may be. |
Prerequisites: | Student has to have basic knowledge on a media sector. |
Key reading: | C. Gallotti: Information security. Oxforf Univerity press, 2019.
L. Zinatullin: The psychology of information security. ItGovernance Publishing, 2016.
D. W. Hubbard, R. Seiersen: How to measure anything incybersecurity risk. Wiley 2016. |
Learning outcome of the module | Codes of the learning outcomes of the programme to which the learning outcome of the module is related [level of competence: scale 1-5] |
---|---|
Student has knowledge of the principles of maintaining security on the Internet. [ZBI_1] |
K_W05 [4/5] |
Student knows the guidelines for data protection and privacy and techniques for securing audiovisual content. [ZBI_2] |
K_W08 [5/5] |
Student has the ability to freely navigate in the network. [ZBI_3] |
K_U08 [5/5] |
Student is able to make decisions in the field of business processes and content assessment on the Internet. [ZBI_4] |
K_U05 [4/5] |
Student has limited confidence in the content on the Internet and can establish relationships with people on the web. [ZBI_5] |
K_K05 [3/5] |
Student is sensitive to possible suspicious cases and content on the web. [ZBI_6] |
K_K07 [4/5] |
Type | Description | Codes of the learning outcomes of the module to which assessment is related |
---|---|---|
Test [ZBI_w_1] | Final exam (test questions and description of examples of network security quality). |
ZBI_1 |
Continuous evaluation [ZBI_w_2] | Assessment of students' skills, attitudes and behavior during classes, their preparation for classes and the implementation of given tasks. |
ZBI_3 |
Form of teaching | Student's own work | Assessment of the learning outcomes | |||
---|---|---|---|---|---|
Type | Description (including teaching methods) | Number of hours | Description | Number of hours | |
lecture [ZBI_fs_1] | Lecture on the rules of moving on the Internet, as well as basic legal norms. Examples of security breaches in the network, talk about how to protect yourself and how to keep information on the Internet safe. |
15 | The student's own work will rely on the use of legal provisions in his work. |
15 |
Test [ZBI_w_1] |
practical classes [ZBI_fs_2] | Group discussion and work on specific examples, their analysis and their solution. |
15 | Individual preparation for each class, systematizing the material presented during the classes, preparation of projects. |
15 |
Continuous evaluation [ZBI_w_2] |
Attachments |
---|
Module description (PDF) |
Syllabuses (USOSweb) | ||
---|---|---|
Semester | Module | Language of instruction |
(no information given) |